iOS 10 jailbreak release date, news: Tool available but still vulnerable; Bug bounty increased to $1.5 million for hackers to crack OS

0

Reports claim that the iOS 10 jailbreak tool has finally been released which could unlock the iPhone 7, iPhone 6s, iPhone 5s, iPhone 5c, iPhone 5 and other devices except for the iPad Pro that run iOS versions iOS 9, iOS 10, iOS 10.0.1, iOS 10.1 and iOS 10.2.

However, Fox5Vegas warns that the tool made available by the Unlock-Jailbreak.net team still has vulnerabilities that hackers can exploit and Apple can tear apart in order to patch. It can be recalled that it is what the Cupertino-based giant did for the previous jailbreak for iOS 9.3.

The firmware is said to allow users to customize the operating system which is not possible through the official App Store. Specifically, they can add options to the control center, add animations and shortcuts, and can even choose from several applications in the Cydia store.

The latest version is only available in English as of the moment and it is recommended that device owners wait for a more stable software to arrive. Downloading the file is also deemed to be very slow and if users choose to get their hands on it, they should always backup all their files on iTunes first in case they have to restore their gadgets later.

Meanwhile, presumably to encourage developers to create a better jailbreak tool, Zerodium revealed that they are willing to pay a $1.5 million bug bounty for the so-called iPhone zero-day attacks.

BGR shares that back in 2015, the exploit broker was willing to pay around $500,000 for iOS 9 bugs. In comparison, Android and Windows Phones bugs will be paid up to $100,000 while Android 7.0 Nougat hackers can get up to $200,000.

In an interview with Wired, Zerodium’s company founder Chaouki Bekrar said, “We’ve increased the price due to the increased security for both iOS 10 and Android 7. We would like to attract more researchers all year long.”

It remains to be seen if there is any group who will take on the challenge.